Latest SolarWinds vulnerability: CVE-2025-26399 #
SolarWinds has disclosed a deserialization of untrusted data vulnerability in the AjaxProxy component of its Web Help Desk (WHD). Successful exploitation allows a remote, unauthenticated adversary to achieve remote code execution (RCE) on the host machine. This vulnerability has been designated CVE-2025-26399 and has been rated critical with a CVSS score of 9.8. This vulnerability bypasses the patch for CVE-2024-28988, which in turn was an incomplete fix for the original vulnerability, CVE-2024-28986.
The following versions are affected
- SolarWinds Web Help Desk versions prior to 12.8.7 Hotfix 1 (HF1)
What is the impact? #
Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.
Are updates or workarounds available? #
Users are encouraged to update to the latest version as quickly as possible:
- SolarWinds Web Help Desk upgrade to version 12.8.7 Hotfix 1 (HF1) or later
How to find potentially vulnerable systems with runZero #
From the Software Inventory, use the following query to locate potentially impacted assets:
vendor:=SolarWinds AND (product:="Web Help Desk" OR product:="webhelpdesk") AND (version:>0 AND version:<12.8.7.2174)
October 2024: CVE-2024-28987 #
According to the US Cybersecurity and Infrastructure Security Agency (CISA), a critical hardcoded password vulnerability within SolarWinds' Web Help Desk software is actively being exploited and was added to their Known Exploited Vulnerability (KEV) catalog.
CVE-2024-28987 is rated critical with CVSS score of 9.1 allowing for unauthorized access by a remote attacker.
What is the impact? #
A remote attacker has the ability to log in to a vulnerable system using hardcoded credentials, providing access to internal information with the ability to modify the data.
Are updates or workarounds available? #
According to the security advisory issued by SolarWinds, systems running "WHD 12.8.3 HF1 and all previous versions" of the Web Help Desk software are affected. Organizations are recommended to manually apply the hot fix released by SolarWinds to remove the hardcoded credentials from the software.
How to find potentially vulnerable systems with runZero #
From the Service Inventory, use the following query to locate systems running potentially vulnerable software:
_service.product:="SolarWinds:Web Help Desk:"